US Government, Department of the Navy

This is a public notice flyer to notify interested applicants of anticipated vacancies. Applications will not be accepted through this flyer. Interested applicants must follow the directions in the “How to Apply” section of this flyer to be considered. There may or may not be actual vacancies filled from this flyer. Notice of Result letters will not be sent to applicants who respond to this flyer. *SEE ADDITIONAL INFORMATION SECTION FOR JOB SUMMARY CONTINUATION.


For more details on elgibility, requirements, and evaluation. Please click “Apply Now”, which will take you to the US Gov job platform.


Job Grade: 14
Total Openings: 1


Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities.

Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge of basic concepts and practices of processing digital forensic data.

Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.



ADDITIONAL QUALIFYING ITEMS: Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). Knowledge of incident categories, incident responses, and timelines for responses. Knowledge of incident response and handling methodologies. Knowledge of investigative implications of hardware, Operating Systems, and network technologies. Skill in preserving evidence integrity according to standard operating procedures or national standards. Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies. Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Knowledge of investigative implications of hardware, Operating Systems, and network technologies. Skill in analyzing memory dumps to extract information. Skill in using forensic tool suites (e.g., EnCase, Sleuthkit, FTK). Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). Knowledge of new and emerging information technology (IT) and cybersecurity technologies. Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). Skill in conducting forensic analyses in multiple operating system environments (e.g., mobile device systems). Skill of identifying, capturing, containing, and reporting malware. Skill in preserving evidence integrity according to standard operating procedures or national standards. Skill in collecting data from a variety of cyber defense resources. Knowledge of data carving tools and techniques (e.g., Foremost). Skill in deep analysis of captured malicious code (e.g., malware forensics). Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump). Knowledge of reverse engineering concepts. Knowledge of anti-forensics tactics, techniques, and procedures. Skill in analyzing anomalous code as malicious or benign. Knowledge of industry standard security models. Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce. Skill in applying and incorporating information technologies into proposed solutions. Skill in creating and utilizing mathematical or statistical models. Knowledge of web filtering technologies. Ability to conduct vulnerability scans and recognize vulnerabilities in security systems. Knowledge of circuit analysis. Knowledge of covert communication techniques. Ability to prepare and present briefings. Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software. Knowledge of various types of computer architectures. Knowledge of system fault tolerance methodologies. Knowledge of how system components are installed, integrated, and optimized. Knowledge of industry-standard and organizationally accepted analysis principles and methods. Knowledge of multi-level/security cross domain solutions. Skill in the use of design methods. This position is within the Work Category SUPERVISION/MANAGEMENT at Work Level SENIOR, Series and Grade GG-2210-14 Additional qualification information can be found from the following Office of Personnel Management website: Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., professional, philanthropic, religious, spiritual, community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. *POSITION DUTIES/RESPONSIBILITIES: Performs as the Security Operations Center (SOC) Analyst Lead 50% Develops, analyzes, and defines information technology (IT) systems security integration, testing, operations, and maintenance requirements for new enterprise applications and systems on the organization’s intranet to ensure compliance with systems security requirements, availability and accessibility of mission-critical applications, and protection from unauthorized access. The incumbent is responsible for managing the SOC section while coordinating efforts with the SOC Operations and DCO Change and Compliance Sections within the DCO directorate. Major duties include implementing and overseeing a comprehensive defensive cyberspace operations strategy to enable cyberspace options aligned to command priorities. The incumbent reports directly to the DCO Director. The incumbent ensures that verification, validation, and accreditation for all SOC systems and projects follow the current DoD, USCYBERCOM, JMOC-E, NSA, Joint Capability Access Platform (JCAP) office, and other JMOC-Local DCO directorates and JMOC guidance. Serves as an advocate for all disciplines within the security program, including developing and subsequent enforcement of the organization’s security awareness programs, business continuity and incident response plans, and all governmental compliance issues. Oversees and maintains regulatory requirements and reviews changes for security implications and security applications. Technical and Analytical Expertise 25% Interprets information technology security policy, guidelines, and procedures for systems processing multiple applications that require differing security controls, and are typically accessed by a moderate-to-large user community. The incumbent is the analytical SME, and responsible for the evaluation methods and techniques to perform substantively professional or analytical work assignments. Possess the ability to analyze and articulate functional requirements and standards. Mastery of system testing and evaluation principles, methods, and tools to test the functionality of security controls and optimize the deployment of such controls and system operations. Possess a mastery level of knowledge regarding Internet technologies to analyze potential threats and recommend solutions that provide security controls while enhancing networked systems’ capabilities. Supervisory and/or Managerial Responsibilities 25% Supervises a group of employees performing work at the GG-13 or equivalent level. Provides administrative and technical supervision necessary for accomplishing the work of the unit. Performs other duties as assigned.

Job Requirements:

Job Overview
  • Region
  • Industry
  • Salary

  • Receive job alerts:
    Your subscription could not be saved. Please try again.
    Your subscription has been successful.

    By subscribing below, you acknowledge that your email address will be transferred to Sendinblue for processing in accordance with their terms of use